Personal computers traditionally store files locally, on a medium directly accessed by the computer generating or editing the files. As network access has become more widespread, it has become feasible to store files on a remote network. Storing files on a remote network, also referred to as cloud storage, allows a user to access the files using any device that can access the network. Such cloud storage systems reduce the user's need for local storage capacity and assure the user that, regardless of which device is accessing a file, an up-to-date copy of the file is being accessed.
Existing cloud storage systems either copy a file to a user device to be accessed locally or provide a file to an online web-based application that may be run through a web browser on the user device. Copying the file to the user device for local access requires the user device to devote extra resources of the user device to the file. Providing the file to an online web-based application requires the user to access the file using a program that may not be optimized for the user's device. Neither technique is adaptable to performance demands that may vary across time, users or user devices.
Thus there exists a need in the art to identify applications available to a cloud storage system's user and provide file access to a user-selected application according to the application type. The systems and methods described herein allow a cloud storage system to identify applications which are both available to a user and capable of accessing a file. The systems and methods described herein further allow a cloud storage system to identify the capabilities of a user-selected application and to provide contents of the file being accessed to the user-selected application based on the identified capabilities.
In certain aspects, the systems and methods described herein relate to providing access to a file associated with a cloud storage system. The cloud storage server receives a request to access the file. To fulfill the request, the cloud storage server identifies a request generator. The request generator may be a user associated with the file, a user who generated the request, a device which transmitted the request, or some combination thereof. The cloud storage server may further identify a file type of the file and an application capable of accessing the file type. The cloud storage server may determine whether the identified application is available to the request generator. The applications available to the request generator may include applications installed on a device associated with the request generator or online web-based applications that the request generator is authorized to access. If an application capable of accessing the file type is determined to be available to the request generator, the cloud storage server may determine an application type of the available application. The application type may indicate whether the available application is capable of accessing the file through the cloud storage system. If the available application can access the file through the cloud storage system, the cloud storage server may provide file access information to the available application.
If no identified application is available to the request generator, the cloud storage server may provide the request generator with an option to gain access to an identified application. The cloud storage system may respond to a user selection of such an option by installing the application on a device associated with the request generator. The cloud storage server may also identify whether an application is installed on a user device or whether an application is an online web-based application, and may copy contents of the file to the user device or to a server hosting the online web-based application accordingly.
The systems and methods described herein are set forth in the appended claims.
However, for the purpose of explanation, several embodiments are set forth in the following drawings.
In the following description, numerous details are set forth for the purpose of explanation. However, one of ordinary skill in the art will realize that the implementations described herein may be practiced without the use of these specific details and that the implementations described herein may be modified, supplemented, or otherwise altered without departing from the scope of the systems and methods described herein.
The systems and methods described herein relate to providing access to a file stored on a cloud storage system. In response to a request to access the file, the cloud storage system may identify a request generator, a file type of the file and applications capable of accessing the file type. The cloud storage system may determine which identified applications are available to the request generator. Available applications may include applications installed on a device associated with the request generator and online web-based applications that the request generator is authorized to access. If an identified application is available, the request generator may be provided with a choice of available applications with which to access the file. If no identified application is available to the request generator, the cloud storage system may provide an option of gaining access to an identified application. In some implementations, the cloud storage system may install the identified application on a device associated with the request generator in response to receiving a selection of the option to gain access. In response to an application being found or made available, the cloud storage system may further identify the application type of an available application, which may indicate whether the available application may access the file through the cloud storage system. Applications capable of accessing the file through the cloud storage system may be provided with file access information. Applications incapable of accessing the file through the cloud storage system may be provided with contents of the file.
User device 106 is a computing device used to access cloud storage device 102, and may be a personal laptop computer, a personal desktop computer, a tablet computer, a smartphone, or some other suitable computing device. User device 106 may include installed applications, which in certain implementations may be capable of accessing or altering files stored on cloud storage device 102. In certain implementations, user device 106 may store information regarding the data processing capacity of user device 106, a list of installed applications, a list of file types accessible by each installed application, the capability of each installed application to access a file stored on cloud storage device 102 without downloading a copy of the file, or other suitable information regarding the capability of user device 106 to access files stored on cloud storage device 102. In such implementations, user device 106 may be configured to transmit a portion or the whole of such information upon first connecting to cloud storage device 102, in response to a query by cloud storage device 102, or under other suitable circumstances.
UI 108 is an interface through which a user may access files and applications associated with cloud storage device 102. UI 108 may be an application, such as a web browser or other suitable application, which is run by user device 106 and which displays information received from cloud storage device 102. UI 108 may generate and send commands to cloud storage device 102 in response to a predetermined action by a user, which may include selecting an icon with a cursor or on a touchscreen, selecting a menu option with a cursor or on a touchscreen, writing a text command, or other suitable action. Commands may include requests to access a file with a default application, requests to retrieve a list of applications capable of accessing a file and available to the user, requests to access a file with a selected application, and other suitable commands. In certain implementations, different user interactions with UI 108 may generate different commands.
As an illustrative example of such an implementation on a user device 106 with a touchscreen, UI 108 may detect a user tapping an area of the touchscreen associated with a file. If the user stops pressing the area within a predetermined amount of time, UI 108 may generate a request to access the file using a predetermined default application. If the user presses the area for a period lasting longer than the predetermined amount of time, UI 108 may request a list of available applications capable of opening the file from cloud storage device 102 and provide the list to the user. In response to the user selecting an application from the list, UI 108 may request cloud storage device 102 provide file access to the user-selected application.
Cloud storage system 100 stores computer files and allows a user to access the files with a remote user device 106. User device 106 connects to cloud storage device 102 through network 104. UI 108 displays information provided by cloud storage device 102, such as a list of files associated with the user. A user may interact with UI 108 to request access to a file, such as by selecting icons with a cursor. In response to receiving a file access request, cloud storage device 102 may identify a user selection of an application with which to access the file based on the user's interactions with UI 108, and may provide file access to the user-selected application.
The depicted communication port 202 is a network port which receives user commands via network 104 and transmits information and file contents sent by cloud storage engine 200. Communication port 202 may include a 100BASE-TX port, a 1000BASE-T port, a 10GBASE-T port, a Wi-Fi antenna, a cellular antenna, or other suitable network ports. In certain implementations, there may be a different number of ports than are depicted. In certain implementations, communication port 202 may provide secure communications, such as by using the Secure Sockets Layer (SSL) protocol, the Transport Layer Security (TLS) protocol, or other suitable protocol.
Communication processor 204 may be a computer processor which identifies instructions received through communication port 202 and transmits information to a user device 106 in response. Upon a user connecting to cloud storage engine 200, communication processor 204 may identify the user, in certain implementations by comparing login information provided by the user to information stored in user database 208. Communication processor 204 may further identify the user device 106 from packet headers identifying the source of data received from the user, by querying the user device 106, from information provided by the user device 106 at login, or through some other suitable method of identifying the user device. In response to a user command to access a file, communication processor 204 may identify the file type of the file from a file extension, from a Multipurpose Internet Mail Extension (MIME) type associated with the file, file metadata, or from some other suitable identifying information associated with the file. Communication processor 204 may identify a list of available applications capable of accessing the identified file type by some combination of querying user device 106 for a list of installed applications capable of accessing the identified file type, by identifying cloud storage applications associated with the user and capable of accessing the identified file type, or by some other suitable method. In some implementations, if no application capable of accessing the identified file type is available, communication processor 204 may provide a user with an option to gain access to one or more applications capable of accessing the identified file type. Such an option may be provided by instructing UI 108 to display a message with a link to gain access to an application. In some such implementations, communication processor 204 may install an application on a user device 106 in response to a user accepting an option to gain access to an application. Communication processor 204 may provide the list to user device 106 and allow the user to select an application from the list to access the file. In certain implementations, a user command to access a file may designate an application to access the file, such as by indicating that the file is to be accessed with a predetermined default application. In such implementations, communication processor 204 may not identify or transmit a list of other available applications. Once a user-selected application has been identified, communication processor 204 provides file access to the application.
To provide file access to an application, communication processor 204 identifies an application type of the application. Application types may include applications installed on user device 106, referred to herein as “native applications,” and may identify whether an application is configured to access cloud storage engine 200, referred to herein as being “cloud-capable.” Applications not installed on user device 106 may include online web-based applications provided through cloud storage engine 200, referred to herein as “first-party cloud applications,” or online web-based applications not provided through cloud storage engine 200, referred to herein as “third-party cloud applications.” Communication processor 204 may allow access to contents of a file or to metadata associated with the file based on the type of the user-selected application. As an illustrative example, communication processor 204 may allow a cloud-capable native application or a first-party cloud application to access both a file and metadata associated with the file, but may transmit only a copy of a file to a user device 106 running a cloud-incapable native application or to a server hosting a third-party cloud application. In some implementations, some third-party cloud applications may be cloud-capable while others are not.
File database 206 may be a computer-readable and -writable medium storing at least one file associated with a cloud storage system 100, which may include text, images, audio files, video files, spreadsheets, presentation files, HTML files, or other suitable computer files. File database 206 may also store metadata associated with each file, which may include a MIME type type of the file. In certain implementations, file metadata may also include one or more users authorized to view or edit the file, the application used to generate the file, a default application for accessing the file, a record of when and by whom the file was previously accessed or edited, or other suitable information. In some implementations, a portion of file database 206 may be accessed through a remote network, and may be a third-party database.
User database 208 may be a computer-readable and -writable medium storing information associated with at least one user of cloud storage engine 200. The information may include one or more of a username and password associated with a user, a list of the files associated with each user, a list of at least one user device 106 associated with the user, a list of cloud applications associated with the user, a list of applications available to a user, a list of each application the user has authorized to access each file or file type represented in the user's files, a default application the user has identified for accessing a file type, user-specified preferences, or other suitable user information.
Application database 210 may be a computer-readable and -writable medium storing information regarding applications associated with cloud storage engine 200. Application database 210 may include compiled or uncompiled computer instructions comprising an application, a link to access a cloud application, a link to download a native application, an icon associated with the application, a description of the application, or other suitable information regarding an application. First-party cloud applications may be stored as computer instructions that may be performed by a web browser run on a user device 106, which may be written in HTML, JavaScript, Asynchronous JavaScript and XML (Ajax), or another suitable computer language. In certain implementations, a first-party cloud application may be executed by cloud storage engine 200 and one or more outputs from the first-party cloud application may be transmitted to a user device 106. Application database 210 may store metadata associated with an application, which may include file types the application is capable of opening, the varieties of user device 106 on which the application may run, the users authorized to use the application, whether the application is cloud-capable, alternate versions of the application, or other suitable information. In certain implementations, application database 210 may include metadata for an application not stored in application database 210.
Authentication processor 212 may be a computer processor which blocks unauthorized access of information associated with cloud storage engine 200. Unauthorized access may be detected by comparing one or more of a username and password combination, information identifying a user device 106, geographic information associated with the user device 106, or other suitable information with information stored in user database 204. If a request generator is not successfully verified, authentication processor 212 may transmit a message to the user or a system administrator, block user device 106, temporarily lock the user account, or take some other predetermined action. In certain implementations, if a user device 106 has not previously been connected to cloud storage engine 200, authentication processor 212 may require the user to provide identification information, which may include a username and password combination, an identification number provided to the user by a voice or text message sent to a telephone number previously provided by the user, or other predetermined identification information. In certain implementations, authentication processor 212 may verify that an application may be allowed to access a file by searching file database 206, user database 208, and application database 210 to determine whether the application is associated with the user, whether the application is associated with the file type of the file, whether the user has authorized the application to access the file or the file type, or other suitable verification information. In some such implementations, authentication processor 212 may verify a security token provided by the application against information stored in one or more of file database 206, user database 208, or application database 210. If an application is not authorized to access a file, authentication processor 212 may prevent the application from accessing the file, transmit a message to the user or a system administrator, or take some other suitable action. In certain implementations, such a message to the user may ask if the user wishes to authorize the application to access the file. In certain implementations, authentication processor 212 may establish a secure connection with user device 106 using a protocol such as the SSL or TLS protocols.
Cloud storage engine 200 receives transmissions from user device 106 at communication port 202 via network 104. Communication processor 204 may identify an account associated with a user upon the establishment of a connection with a user device 106, and authentication processor 212 may compare information provided by user device 106 with information stored in user database 208 to verify that the user has access to the account. Communication processor 204 may provide information regarding files associated with the account to user device 106, and may receive a user command to access a file associated with the account. Communication processor 204 may respond to a file access command by identifying a file type of the file and a list of applications available to access the file type. The list may be generated by some combination of identifying applications stored in application database 210 and by determining applications installed on user device 106. The list may be provided to the user by communication processor 204. When communication processor 204 receives a request to provide file access to an application, authentication processor 212 may determine whether the application is authorized to access the file from information stored in file database 206 or user database 208. If the application is authorized to access the file, communication processor 204 may identify the application type from information stored in application database 210 or from information provided by user device 106. The application may be given access to contents of the file based on its application type. In certain implementations, communication processor 204 may provide access to the contents of a file to a native cloud-incapable application by copying the file to user device 106.
Having identified the file type of the requested file, application identification process 500 continues to step 503, which identifies whether the user has selected to access the file with an available default application. A default application may be an application a user has selected for opening all files of a file type, for opening a particular file, or for opening files of some other suitable characteristic, and may be identified by information stored in file database 206, user database 208, or application database 210. In cases where application database 210 identifies a default application, step 503 may be preceded by step 504, described below. A user may choose default applications by manually identifying an application used to open a particular file or file type, by establishing that the application the user most recently used to access the file is the default application, by establishing that the application used to generate the file is the default application, or by other suitable methods for choosing a default application. In certain implementations, a default application may depend on the user device 106 being used to access the file. As an illustrative example of such implementations, a user may choose a native image display application as the default application for accessing a picture with a mobile device, but choose a first-party cloud image editing application as the default application to access the same picture with a laptop computer. As an alternative example, a user may designate an application as the default application for accessing a file, with the native version of the application the default on a user device 106 which has the application installed and the cloud application the default on a user device 106 which does not have the application installed. If the user indicates that the file is to be accessed with a default application, the default application may access the file according to file access process 600, described in relation to
In step 504, communication processor 204 may generate a list of at least one application available to the user and capable of opening the identified file type. As described in relation to
In step 505, communication processor 204 provides the list of available applications to the user, in certain implementations by sending a command to user device 106 to display an application selection interface such as UI 300 or 400, as depicted in
Having identified the application type, file access process 600 continues to step 605, in which communication processor 204 determines whether the application is cloud-capable. If so, in step 606 authentication processor 212 determines whether the application is authorized to access the file, as described in relation to
If the application is not found to be cloud-capable in step 605, communication processor 204 copies the file to the user device 106 in step 608, and may instruct user device 106 to open the copied file with the application in step 609. In certain implementations, authentication processor 212 may confirm that user device 106 is authorized to store the file or that the cloud-incapable application is authorized to access the file before copying the file to user device 106. In some implementations, the file may be copied to an element of network 104, such as a server running a third-party cloud application, and the application may access the file copy on the element of network 104.
If step 702 confirms that the user device 106 is authorized, authentication processor 212 may allow the user device 106 to access the authorizing user's data in step 703. In certain implementations, authentication processor 212 may examine other data before allowing the user device 106 to access the authorizing user's data. In such implementations, authentication processor 212 may compare information stored in user database 208 with Global Positioning System (GPS) data from the user device 106, IP routing data, or other data associated with the user device 106, and may proceed to step 707 in the case of a mismatch. As an illustrative example of such implementations, if a first user device 106 is accessing data associated with a user account, and a second user device 106 in a different geographic location attempts to access data associated with the same user account, authentication processor 214 may block the second user device 106 from accessing the cloud storage engine 200. In certain implementations, a first user device 106 may be authorized to access a different set of the same user's files as a second user device 106. As an illustrative example of such an implementation, a user may authorize a mobile computing device to access files associated with the user but not sensitive financial files associated with the user's account.
If the user device 106 is not authorized, user verification process 700 may proceed to step 704. In step 704, authentication processor 212 may transmit a request for user identification information to the user device 106 via communication processor 204. Communication processor 204, upon receiving the user identification information in step 705, passes the information to authentication processor 212 so that the user identification information may be verified in step 706. User identification information may be compared against information stored in user database 208, and may include a user ID and password combination, a personal identification number (PIN), an automatically generated identification number provided to a phone number provided by the user, or other suitable identifying information. If the user identification is incorrect, authentication processor 212 may instruct communication processor 204 to block access by the device in step 707, and may temporarily block access to the account, alert the user or a systems administrator, or take other suitable action.
If the user identification is correct, step 708 may determine whether the user wants to authorize the user device 106, which may be determined by identifying whether the user selected a “Remember this device” option in providing identification information, by transmitting a prompt to the user to select whether to permanently authorize the user device 106, or by some other suitable method. If not, the authentication processor 212 provides the user device 106 with temporary access in step 709. Otherwise, in step 710 the authentication processor 212 provides the user device 106 with access to cloud storage engine 200 and records information identifying the device in user database 208.
The computing device 800 comprises at least one communications interface unit, an input/output controller 810, system memory, and one or more data storage devices. This can support a network connection such as a connection to network 104 in
The computing device 800 may be configured in a distributed architecture, wherein databases and processors are housed in separate units or locations. Some units perform primary processing functions and contain, at a minimum, a general controller or a processor and a system memory. In distributed architecture implementations, each of these units may be attached via the communications interface unit 808 to a communications hub or port (not shown) that serves as a primary communication link with other servers, client or user computers, and other related devices. The communications hub or port may have minimal processing capability itself, serving primarily as a communications router. A variety of communications protocols may be part of the system, including, but not limited to: Ethernet, SAP, SAS™, ATP, BLUETOOTH™, GSM, and TCP/IP.
The CPU 806 comprises a processor, such as one or more conventional microprocessors and one or more supplementary co-processors such as math co-processors for offloading workload from the CPU 806. The CPU 806 is in communication with the communications interface unit 808 and the input/output controller 810, through which the CPU 806 communicates with other devices such as other servers, user terminals, or devices. The communications interface unit 808 and the input/output controller 810 may include multiple communication channels for simultaneous communication with, for example, other processors, servers, or client terminals.
The CPU 806 is also in communication with the data storage device. The data storage device may comprise an appropriate combination of magnetic, optical, or semiconductor memory, and may include, for example, RAM 802, ROM 804, flash drive, an optical disc such as a compact disc, or a hard disk or drive. The CPU 806 and the data storage device each may be, for example, located entirely within a single computer or other computing device; or connected to each other by a communication medium, such as a USB port, serial port cable, a coaxial cable, an Ethernet cable, a telephone line, a radio frequency transceiver, or other similar wireless or wired medium or combination of the foregoing. For example, the CPU 806 may be connected to the data storage device via the communications interface unit 808. The CPU 806 may be configured to perform one or more particular processing functions.
The data storage device may store, for example, (i) an operating system 812 for the computing device 800; (ii) one or more applications 814 (e.g., computer program code or a computer program product) adapted to direct the CPU 806 in accordance with the systems and methods described here, and particularly in accordance with the processes described in detail with regard to the CPU 806; or (iii) database(s) 816 adapted to store information that may be utilized to store information required by the program. The depicted database 816 can be any suitable database system, and can be a local or distributed database system.
The operating system 812 and applications 814 may be stored, for example, in a compressed, an uncompiled and an encrypted format, and may include computer program code. The instructions of the program may be read into a main memory of the processor from a computer-readable medium other than the data storage device, such as from the ROM 804 or from the RAM 802, or from a computer data signal embodied in a carrier wave, such as that found within the well-known Web pages transferred among devices connected to the Internet. While execution of sequences of instructions in the program causes the CPU 806 to perform the process steps described herein, hard-wired circuitry may be used in place of, or in combination with, software instructions for implementation of the processes of the present disclosure. Thus, the systems and methods described are not limited to any specific combination of hardware and software.
Suitable computer program code may be provided for performing one or more functions in relation to a cloud storage system as described herein. The program also may include program elements such as an operating system 812, a database management system, and “device drivers” that allow the processor to interface with computer peripheral devices (e.g., a video display, a keyboard, a computer mouse, etc.) via the input/output controller 810.
The term “computer-readable medium” as used herein refers to any non-transitory medium that provides or participates in providing instructions to the processor of the computing device 800 (or any other processor of a device described herein) for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media include, for example, optical, magnetic, or opto-magnetic disks, or integrated circuit memory, such as flash memory. Volatile media include dynamic random access memory (DRAM), which typically constitutes the main memory. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM or EEPROM (electronically erasable programmable read-only memory), a FLASH-EEPROM, any other memory chip or cartridge, or any other non-transitory medium from which a computer can read.
Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to the CPU 806 (or any other processor of a device described herein) for execution. For example, the instructions may initially be borne on a magnetic disk of a remote computer (not shown). The remote computer can load the instructions into its dynamic memory and send the instructions over an Ethernet connection, cable line, or even telephone line using a modem. A communications device local to a computing device 800 (e.g., a server) can receive the data on the respective communications line and place the data on a system bus for the processor. The system bus carries the data to main memory, from which the processor retrieves and executes the instructions. The instructions received by main memory may optionally be stored in memory either before or after execution by the processor. In addition, instructions may be received via a communication port as electrical, electromagnetic, or optical signals, which are exemplary forms of wireless communications or data streams that carry various types of information.
Some implementations of the above described may be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be apparent to those skilled in the art. Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, requests, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
While various embodiments of the present disclosure have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, changes, and substitutions will now occur to those skilled in the art without departing from the disclosure. For example, cloud storage engine 200 may install a native version of a user-selected application on a user device 106 if the application is not installed. Also, cloud storage engine 200 may respond to a command to run an application by running a native version of the application if installed, but run the cloud version of the same application otherwise. It should be understood that various alternatives to the embodiments of the disclosure described herein may be employed in practicing the disclosure. Elements of an implementation of the systems and methods described herein may be independently implemented or combined with other implementations. It is intended that the following claims define the scope of the disclosure and that methods and structures within the scope of these claims and their equivalents be covered thereby.
This application is a continuation of co-pending U.S. patent application Ser. No. 13/787,187, filed on Mar. 6, 2013, entitled “System and Method for Detecting and Integrating with Native Applications Enabled for Web-Based Storage,” which claims benefit under 35 U.S.C. § 119(e) of U.S. Provisional Application No. 61/664,651, filed Jun. 26, 2012, which is incorporated herein by reference in its entirety, and of U.S. Provisional Application No. 61/664,627, filed on Jun. 26, 2012. All of the aforementioned applications are incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
7263688 | Pitzel et al. | Aug 2007 | B2 |
7680932 | Defaix et al. | Mar 2010 | B2 |
7689633 | Li et al. | Mar 2010 | B1 |
7707413 | Lunt et al. | Apr 2010 | B2 |
7711835 | Braddy et al. | May 2010 | B2 |
7734914 | Malasky | Jun 2010 | B1 |
7779113 | Samar | Aug 2010 | B1 |
7827201 | Gordon et al. | Nov 2010 | B1 |
7917888 | Chong et al. | Mar 2011 | B2 |
7941419 | Bhatkar et al. | May 2011 | B2 |
7996380 | Arrouye et al. | Aug 2011 | B2 |
8108427 | Prahlad et al. | Jan 2012 | B2 |
8131723 | Sim-Tang | Mar 2012 | B2 |
8151323 | Harris et al. | Apr 2012 | B2 |
8250455 | Kadowaki et al. | Aug 2012 | B2 |
8341708 | Eatough et al. | Dec 2012 | B1 |
8346781 | Cornelius | Jan 2013 | B1 |
8364759 | Moromisato et al. | Jan 2013 | B2 |
8386478 | Wang | Feb 2013 | B2 |
8468455 | Jorgensen | Jun 2013 | B2 |
8478817 | Duggal | Jul 2013 | B2 |
8484259 | Makkar et al. | Jul 2013 | B1 |
8504689 | Ferris et al. | Aug 2013 | B2 |
8522137 | Brown et al. | Aug 2013 | B1 |
8566391 | Saito | Oct 2013 | B2 |
8572033 | Shukla et al. | Oct 2013 | B2 |
8612439 | Prahlad et al. | Dec 2013 | B2 |
8706800 | Ahmed et al. | Apr 2014 | B1 |
8812627 | Donahue et al. | Aug 2014 | B2 |
8813174 | Koeten | Aug 2014 | B1 |
8856176 | Venu et al. | Oct 2014 | B1 |
8880580 | Simmons et al. | Nov 2014 | B2 |
9164997 | von Haden | Oct 2015 | B2 |
9396194 | Kaszynski et al. | Jul 2016 | B2 |
20030033369 | Bernhard | Feb 2003 | A1 |
20030126592 | Mishra et al. | Jul 2003 | A1 |
20040059776 | Pitzel et al. | Mar 2004 | A1 |
20040205358 | Erickson | Oct 2004 | A1 |
20040243827 | Aquilera et al. | Dec 2004 | A1 |
20050243760 | Yoshioka | Nov 2005 | A1 |
20050289538 | Black-Ziegelbein et al. | Dec 2005 | A1 |
20060005168 | Singh | Jan 2006 | A1 |
20060070029 | Laborczfalvi et al. | Mar 2006 | A1 |
20060074837 | Braddy et al. | Apr 2006 | A1 |
20060178778 | Fuhlbrigge et al. | Aug 2006 | A1 |
20070106984 | Olsen et al. | May 2007 | A1 |
20070192739 | Hunleth et al. | Aug 2007 | A1 |
20070240098 | Averett et al. | Oct 2007 | A1 |
20070254631 | Spooner | Nov 2007 | A1 |
20080033921 | Arrouye et al. | Feb 2008 | A1 |
20080162493 | Blohm et al. | Jul 2008 | A1 |
20080172720 | Botz et al. | Jul 2008 | A1 |
20080184157 | Selig | Jul 2008 | A1 |
20080189361 | Greschler et al. | Aug 2008 | A1 |
20090083707 | Fujita et al. | Mar 2009 | A1 |
20090115901 | Winter et al. | May 2009 | A1 |
20090210721 | Phillips | Aug 2009 | A1 |
20090235352 | Schrijen et al. | Sep 2009 | A1 |
20090249185 | Datar et al. | Oct 2009 | A1 |
20090254572 | Redlich et al. | Oct 2009 | A1 |
20090254580 | Laurion | Oct 2009 | A1 |
20090288135 | Chang et al. | Nov 2009 | A1 |
20100005529 | Hemade | Jan 2010 | A1 |
20100088234 | Moore et al. | Apr 2010 | A1 |
20100161762 | Saxena | Jun 2010 | A1 |
20100199037 | Umbehocker | Aug 2010 | A1 |
20100257578 | Shukla et al. | Oct 2010 | A1 |
20100274910 | Ghanaie-Sichanie et al. | Oct 2010 | A1 |
20100281528 | Hayton et al. | Nov 2010 | A1 |
20100287219 | Caso et al. | Nov 2010 | A1 |
20100325086 | Skinner et al. | Dec 2010 | A1 |
20100325199 | Park et al. | Dec 2010 | A1 |
20110022642 | deMilo | Jan 2011 | A1 |
20110063410 | Robert | Mar 2011 | A1 |
20110066668 | Guarraci | Mar 2011 | A1 |
20110093507 | Pilip | Apr 2011 | A1 |
20110137979 | Seo et al. | Jun 2011 | A1 |
20110154290 | Kelly | Jun 2011 | A1 |
20110184993 | Chawla | Jul 2011 | A1 |
20110202672 | Narayanaswamy et al. | Aug 2011 | A1 |
20110209045 | Ghosh et al. | Aug 2011 | A1 |
20110209049 | Ghosh | Aug 2011 | A1 |
20110231912 | Lee et al. | Sep 2011 | A1 |
20110247074 | Manring | Oct 2011 | A1 |
20110252038 | Schmidt et al. | Oct 2011 | A1 |
20110252071 | Cidon | Oct 2011 | A1 |
20110258535 | Adler et al. | Oct 2011 | A1 |
20120005159 | Wang et al. | Jan 2012 | A1 |
20120072465 | McGowan et al. | Mar 2012 | A1 |
20120084685 | Heynen et al. | Apr 2012 | A1 |
20120095878 | Feldman et al. | Apr 2012 | A1 |
20120099135 | Ono | Apr 2012 | A1 |
20120110646 | Ajitomi et al. | May 2012 | A1 |
20120117626 | Yates et al. | May 2012 | A1 |
20120144202 | Counterman | Jun 2012 | A1 |
20120144454 | Lee | Jun 2012 | A1 |
20120158668 | Tu et al. | Jun 2012 | A1 |
20120173612 | Vegesna-Venkata et al. | Jul 2012 | A1 |
20120179746 | Bolgert et al. | Jul 2012 | A1 |
20120192067 | DeLuca et al. | Jul 2012 | A1 |
20120254042 | Ludemann | Oct 2012 | A1 |
20120265803 | Ha | Oct 2012 | A1 |
20120266229 | Simone et al. | Oct 2012 | A1 |
20130018904 | Mankala et al. | Jan 2013 | A1 |
20130036455 | Bodi et al. | Feb 2013 | A1 |
20130054356 | Richman et al. | Feb 2013 | A1 |
20130086670 | Vangpat et al. | Apr 2013 | A1 |
20130111336 | Dorman et al. | May 2013 | A1 |
20130124606 | Carpenter et al. | May 2013 | A1 |
20130144934 | Swett et al. | Jun 2013 | A1 |
20130151657 | Lehman | Jun 2013 | A1 |
20130282752 | Day-Richter et al. | Oct 2013 | A1 |
20130282755 | Procopio et al. | Oct 2013 | A1 |
20130304797 | Warren et al. | Nov 2013 | A1 |
Number | Date | Country |
---|---|---|
10-2010-0137323 | Dec 2010 | KR |
10-2012-0010397 | Feb 2012 | KR |
10-2012-0065072 | Jun 2012 | KR |
10-2013-0007459 | Jan 2013 | KR |
WO 200135211 | May 2001 | WO |
WO 2010054374 | May 2010 | WO |
Entry |
---|
Beresford et al., “MockDroid: Trading Privacy for Application Functionality on Smartphones,” HotMobile '11, Mar. 1-3, 2011, Phoenix, AZ, USA, pp. 49-54. |
Bibi et al., “A Platform for Delivering Multimedia Presentations on Cultural Heritage,” 2010 14th Panhellenic Conference on Informatics, pp. 175-179. |
Ellis et al., “Concurrency Control in Groupware Systems,” ACM 1989, pp. 399-407. |
Guo et al., “Building the PolarGrid Portal Using Web 2.0 and OpenSocial,”SC '09, Nov. 14-20, 2009, Portland, Oregon, USA; 8 pages. |
http://web.archive.org/web/20110629120453/https://developermozilla.org/en/Setting_up_extension_development_environment, Jun. 29, 2011, printed Jan. 9, 2015, 5 pages. |
http://web.archive.org/web/20111006093926/https://addons.mozilla.org/en-US/firefox/extensions/?sort=featured, Oct. 6, 2011, printed Oct. 26, 2014, 9 pages. |
http://web.archive.org/web/20111219132014/https://addons.mozilla.org/en-US/seamonkey, Dec. 19, 2011, printed Oct. 26, 2014, 5 pages. |
http://web.archive.org/web/20120512130530/https://developer.mozilla.org/en/Setting_up_extension_development_ environment, May 12, 2012, 7 pages. |
http://web.archive.org/web/20120819143535/https://addons.mozilla.org/en-US/firefox/extensions/?sort=featured, Aug. 19, 2012, printed Dec. 13, 2013, 3 pages. |
http://web.archive.org/web/20121020134710/https://addons.mozilla.org/en-US/seamonkey/extensions, Oct. 20, 2012, printed Dec. 13, 2013, 3 pages. |
http://web.archive.org/web/20121021135356/http://support.mozilla.org/en-US/kb/find-and-install-add-ons-add-features-to-firefox, Oct. 21, 2012, printed Dec. 13, 2013, 3 pages. |
http://web.archive.org/web20111226173518/http://en.wikipedia.org/wiki/Add-on_(Mozilla), Dec. 26, 2011, printed Oct. 26, 2014, 5 pages. |
http://www-archive.mozilla.org/projects/webservices/, snapshot taken Apr. 21, 2008, printed Dec. 13, 2013, 4 pages. |
https://addons.mozilla.org/en-US/firefox/addon/extension-manager-extended/, printed Oct. 26, 2014, 2 pages. |
https://addons.mozilla.org/En-us/seamonkey/addon/gmail-smime/?src=search, printed Dec. 13, 2013, 2 pages. |
International Search Report and Written Opinion dated Jul. 30, 2014 for Application No. PCT/US2014/032167. |
International Search Report and Written Opinion for PCT/US2013/037701 dated Jun. 26, 2013, 10 pages. |
International Search Report and Written Opinion for PCT/US2013/037773 dated Aug. 21, 2013, 13 pages. |
International Search Report and Written Opinion for PCT/US2013/047877 dated Oct. 31, 2013, 9 pages. |
International Search Report and Written Opinion for PCT/US2014/029756 dated Jul. 28, 2014, 11 pages. |
Mayer et al., “Third-Party Web Tracking: Policy and Technology,” Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 413-427, May 20-23, 2012. |
Nauman et al., “Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints,” ASIACCS '10, Apr. 13-16, 2010, Beijing, China, pp. 328-332. |
Nichols et al., “High-Latency, Low-Bandwidth Windowing in the Jupiter Collaboration System,” UIST '95. 8th Annual Symposium on User Interface Software and Technology. Proceedings of the ACM Symposium on User Interface Software and Technology, Nov. 14-17, 1995, pp. 111-120. |
The OAuth 2.0 Authorization Protocol; draft ietf-oauth-v2-24; Mar. 8, 2012. |
Zhou et al., “Taming Information-Stealing Smartphone Applications (on Android),” TRUST 2011, LNCS 6740, pp. 93-107, 2011. |
Zissis et al., “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems 28 (2012) 583-592. |
Number | Date | Country | |
---|---|---|---|
20160196280 A1 | Jul 2016 | US |
Number | Date | Country | |
---|---|---|---|
61664627 | Jun 2012 | US | |
61664651 | Jun 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13787187 | Mar 2013 | US |
Child | 15069397 | US |